<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>risk Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/risk/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sat, 04 Sep 2021 04:47:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>risk Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Risk Needs to be Simplified</title>
		<link>https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 04:45:55 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity risk]]></category>
		<category><![CDATA[impact]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2608</guid>

					<description><![CDATA[<p>Introduction I believe complexity is the enemy of execution and unnecessary complication is often tied to ego and lack of clarity. In cybersecurity just about everything is overly complicated. I&#8217;m not sure why. I sometimes even wonder if I understand cybersecurity. With all the frameworks, best practices, maturity models, team/hacker colors, next-gen appliances, etc., it&#8217;s [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/">Cybersecurity Risk Needs to be Simplified</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Risk Needs to be Simplified' data-link='https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/' data-app-id-name='category_above_content'></div><div id="block-24450c0c9cda9d58b9b5" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;"><img fetchpriority="high" decoding="async" class="size-medium wp-image-2609 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-200x300.jpg" alt="cybersecurity risk" width="200" height="300" srcset="https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-200x300.jpg 200w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-683x1024.jpg 683w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-768x1152.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-1024x1536.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-1365x2048.jpg 1365w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-640x960.jpg 640w, https://christianespinosa.com/wp-content/uploads/2021/09/john-moeses-bauan-bEY5NoCSQ8s-unsplash-scaled.jpg 1707w" sizes="(max-width: 200px) 100vw, 200px" />Introduction</h2>
</div>
</div>
<div id="block-yui_3_17_2_1_1581547246215_13874" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p class="">I believe complexity is the enemy of execution and unnecessary complication is often tied to ego and lack of clarity. In cybersecurity just about everything is overly complicated. I&#8217;m not sure why. I sometimes even wonder if I understand cybersecurity. With all the frameworks, best practices, maturity models, team/hacker colors, next-gen appliances, etc., it&#8217;s hard to keep up. The cybersecurity industry seems to want to learn new methods to slam dunk, without learning how to dribble first. I get it &#8211; slam dunking is sexy; dribbling is boring. The fact of the matter though is most people that master a skill get very good at a few key moves and ignore the rest.</p>
<p class="">In cybersecurity, there&#8217;s this notion that you need to master 100 things to be secure. This doesn&#8217;t work. The reality is mastering the Top 5 to 6 things is often enough, especially if you know your critical assets (data and systems) and the risk facing them.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Risk &#8211; Traditional Definition</h2>
<p class="">Risk is a misunderstood and elusive topic in cybersecurity. Over my career I&#8217;ve met very few cybersecurity professionals that actually understand risk. Sure, they read about it in a book or learn about it preparing for the CISSP or Security+ certification exams, but they don’t really understand risk.  They&#8217;ll tell you the formula:</p>
<p class=""><strong><em>Risk = Threat X Vulnerability</em></strong></p>
<p class="">This is what the academics say. What does this really mean though?</p>
<p class="">What is a threat? What is a vulnerability?</p>
<p class="">What about impact or probability?  These aren&#8217;t even listed in the equation above, yet they are the most important parts.</p>
<p class="">A threat is something that could cause damage.</p>
<p class="">A vulnerability is an exposure to a threat.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1581548692394_47096" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p><img decoding="async" class="alignright wp-image-3144 size-full" src="https://alpinesecurity.com/wp-content/uploads/2020/02/opencarwindow.jpg" alt="cybersecurity risk" width="500" height="333" /></p>
<p class="">So, using the formula that most cybersecurity professionals have been taught for risk, it&#8217;s understandable why it&#8217;s not understood.</p>
<p class="">If a threat is water from rain and the vulnerability is an open car window, what&#8217;s the risk?</p>
<p class="">Risk = Water X Open Car Window ?</p>
<p class="">This is where most cybersecurity professionals start mumbling about frameworks, qualitative, quantitative, and other lingo with the intent to complicate something that should be simple. And, there’s not much you can do with that formula &#8211; very little value.</p>
<p class="">The problem is how do you prioritize which open car windows to close first? If you are a nationwide organization with 1000 cars and 800 of them have an open window, what do you do? You only have so many resources.</p>
<p class="">Let&#8217;s dig a little deeper on this.</p>
<p class="">Of the 800 cars with open windows, they fall in different categories:</p>
<p class=""><strong>Arizona</strong></p>
<ul>
<li>50 brand new cars parked in garages</li>
<li>50 brand new cars parked outside</li>
<li>200 old cars parked in garages</li>
<li>100 old cars parked outside</li>
</ul>
<p><strong>Seattle</strong></p>
<ul>
<li>50 brand new cars parked in garages</li>
<li>50 brand new cars parked outside</li>
<li>200 old cars parked in garages</li>
<li>100 old cars parked outside</li>
</ul>
<p class="">So, using the risk formula, what do you do? <strong><em> Risk = Threat X Vulnerability</em></strong></p>
<p class="">Exactly. The formula is kind of useless. You can&#8217;t close all the car windows at once &#8211; you have limited resources.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Risk &#8211; Practical Explanation</h2>
<p class="">A more useful risk formula is <strong><em>Risk = Probability X Impact</em></strong></p>
<p class="">Risk = <strong>Probability</strong> of Threat Being Realized X <strong>Impact</strong> if Threat is Realized</p>
<p class="">Probability can also be referenced as likelihood.</p>
<p class="">Impact can also be referenced as a consequence.</p>
<p class="">To me, this makes more sense than Threat X Vulnerability, which is what CISSP and other cybersecurity certs teach us.</p>
<p class="">Let&#8217;s take the open car window scenario:</p>
<p class=""><strong>Arizona</strong></p>
<ul>
<li>50 brand new cars parked in garages</li>
<li>50 brand new cars parked outside</li>
<li>200 old cars parked in garages</li>
<li>100 old cars parked outside</li>
</ul>
<p><strong>Seattle</strong></p>
<ul>
<li>50 brand new cars parked in garages</li>
<li>50 brand new cars parked outside</li>
<li>200 old cars parked in garages</li>
<li>100 old cars parked outside</li>
</ul>
<p class="">Likelihood of rain (water)</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1581547246215_15849" class="sqs-block image-block sqs-block-image sqs-col-8 span-8 float float-right sqs-text-ready" data-aspect-ratio="44.50784593437946" data-block-type="5">
<div id="yui_3_17_2_1_1582181568286_389" class="sqs-block-content">
<div id="yui_3_17_2_1_1582181568286_388" class="image-block-outer-wrapper layout-caption-below design-layout-inline combination-animation-none individual-animation-none individual-text-animation-none">
<div id="yui_3_17_2_1_1582181568286_387" class="intrinsic">
<div class="image-caption-wrapper">
<div class="image-caption">
<figure id="attachment_3145" aria-describedby="caption-attachment-3145" style="width: 551px" class="wp-caption alignright"><img decoding="async" class="wp-image-3145 " src="https://alpinesecurity.com/wp-content/uploads/2020/02/alpinesecurityriskmatrix.jpg" alt="Alpine Security Risk Matrix" width="551" height="291" /><figcaption id="caption-attachment-3145" class="wp-caption-text">Simple Risk Matrix</figcaption></figure>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="block-yui_3_17_2_1_1581548692394_159694" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<ol>
<li>Seattle = Near Certain</li>
<li>Arizona = Likely</li>
<li>In Garage (location doesn&#8217;t matter) = Rare</li>
</ol>
<p class="">Impact:</p>
<ol>
<li>New car = Significant</li>
<li>Old car = Minor</li>
</ol>
<p class="">Which windows do we close first? Let&#8217;s use the matrix as a guide.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1581547246215_29942" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<ul data-rte-list="default">
<li>
<p class="">Seattle, New Car</p>
<ul data-rte-list="default">
<li>
<p class="">Near Certain X Significant = Critical Risk<a href="https://christianespinosa.com/resources/spitr/cybersecurityrisksimplified-christianespinosa/"><img loading="lazy" decoding="async" class="alignright wp-image-2136" src="https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa-206x300.jpg" alt="cybersecurity risk" width="328" height="478" srcset="https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa-206x300.jpg 206w, https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa.jpg 580w" sizes="(max-width: 328px) 100vw, 328px" /></a></p>
</li>
</ul>
</li>
<li>
<p class="">Seattle, Old Car</p>
<ul data-rte-list="default">
<li>
<p class="">Near Certain X Minor = High Risk</p>
</li>
</ul>
</li>
<li>
<p class="">Arizona, New Car</p>
<ul data-rte-list="default">
<li>
<p class="">Likely X Significant = Medium</p>
</li>
</ul>
</li>
<li>
<p class="">Arizona, Old Car</p>
<ul data-rte-list="default">
<li>
<p class="">Likely X Minor = Low</p>
</li>
</ul>
</li>
<li>
<p class="">Garage, New Car</p>
<ul data-rte-list="default">
<li>
<p class="">Rare X Significant = Medium</p>
</li>
</ul>
</li>
<li>
<p class="">Garage, Old Car</p>
<ul data-rte-list="default">
<li>
<p class="">Rare X minor = Informational</p>
</li>
</ul>
</li>
</ul>
<p class="">So, we would prioritize the windows to close in order of risk:</p>
<ol>
<li>Critical Risk = Seattle, New Car</li>
<li>High Risk = Seattle, Old Car</li>
<li>Medium Risk = Arizona, New Car</li>
<li>Medium Risk = Garage, New Car</li>
<li>Low Risk = Arizona, Old Car</li>
<li>Informational Risk = Garage, Old Car</li>
</ol>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Conclusion</h2>
<p class="">Think of risk in terms of probability and impact, not threat times vulnerability.</p>
</div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Risk Needs to be Simplified' data-link='https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Risk Needs to be Simplified' data-link='https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/">Cybersecurity Risk Needs to be Simplified</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-risk-needs-to-be-simplified/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It</title>
		<link>https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/</link>
					<comments>https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 10:40:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[cybersecurity risk]]></category>
		<category><![CDATA[impact]]></category>
		<category><![CDATA[probability]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2381</guid>

					<description><![CDATA[<p>A foundation of cybersecurity is, where is the risk? Based on risk comprehension, professionals map out a cybersecurity framework and strategy. While risk assessment is essential to executing proactive and reactive cybersecurity plans, the gap is that a deep understanding of risk is not as widespread as you’d imagine. The reality is that risk comprehension is a [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/">Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It' data-link='https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2136 " src="https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa.jpg" alt="cybersecurity risk" width="433" height="632" srcset="https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa.jpg 580w, https://christianespinosa.com/wp-content/uploads/2021/01/CybersecurityRiskSimplified-ChristianEspinosa-206x300.jpg 206w" sizes="(max-width: 433px) 100vw, 433px" />A foundation of cybersecurity is, where is the risk? Based on risk comprehension, professionals map out a <a href="https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/" target="_blank" rel="noopener">cybersecurity framework</a> and strategy. While risk assessment is essential to executing proactive and reactive cybersecurity plans, the gap is that a deep understanding of risk is not as widespread as you’d imagine.</p>
<p>The reality is that risk comprehension is a basic cybersecurity skill, yet most practitioners lack it. In this post, we’ll be breaking down:</p>
<ul>
<li>What is risk comprehension?</li>
<li>Why is there a gap in professional proficiency in the area?</li>
<li>How to ensure professionals gain this expertise and know how to execute it in cybersecurity operations.</li>
</ul>
<h2>What Is Risk Comprehension?</h2>
<p>Simply put, it’s having a full technical understanding of risk fundamentals within the cybersecurity ecosystem. Beyond just the confines of cybersecurity, life is about risk, in general. So, the inability to grasp it in cybersecurity directly relates to the bigger picture of people not comprehending risk.</p>
<h3>Quantifying Risk</h3>
<p>In most areas of certification or academic, risk is a formula:</p>
<p><strong>Risk = Threat x Vulnerability</strong></p>
<p>In unpacking this formula, you can see it&#8217;s easy for it to be confusing. How are threats and vulnerabilities quantifiable?</p>
<p>In my book, <a href="https://christianespinosa.com/book/smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, I describe a more palatable formula:</p>
<p><strong>Risk = Probability x Impact</strong></p>
<p>In other words, how likely is something to happen, and what’s the consequence if it does?</p>
<p>The answer to this formula will identify three kinds of risk:</p>
<ul>
<li>Low risk has a low probability and impact.</li>
<li>Medium risk could have high probability and low impact or low probability and high impact.</li>
<li>High risk is highly probable and impactful.</li>
</ul>
<h3>Cybersecurity Risk Is Just Another Operational Risk</h3>
<p>The risk of cybersecurity incidents falls into the broader category of operational risk. The types of risk include those that could involve:</p>
<ul>
<li>Financials</li>
<li>Reputation</li>
<li>Operations</li>
<li>Productivity</li>
<li>Accessibility</li>
<li>Regulatory</li>
<li>Damage to equipment or hardware</li>
</ul>
<p>With many opportunities for impact in this area of risk, hackers can seize on vulnerabilities. Further, cybercriminals will take advantage of risk indecision. Thus, it’s imperative to have risk literate cybersecurity professionals.</p>
<h2>Why Cybersecurity Professionals Need to Grasp Risk</h2>
<p>The concept of a cybersecurity professional is one that mitigates risk and secures data. It’s the two-second job description. Knowing, you’d think these people would be risk experts. Yet based on my experience running a cybersecurity firm and teaching cybersecurity to college students, I can tell you there’s a gap.</p>
<p>This lack of understanding risk is complicating the industry. It should be a simple connection that will enable cybersecurity professionals to do the best job. Instead, we’re seeing an influx of <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a> in the industry. These are the folks with cybersecurity certifications on their resume. They look ideal on paper, but when hired, are immediately like a fish out of water. They don’t have the necessary skills to fall back on, so they begin a routine of destructive behaviors affecting your company and their ability to succeed.</p>
<p>You’ll find those who don’t have this risk knowledge to begin posturing to cover this deficit. Posturing is a defensive response that involves overcomplicating processes and a pursuit by the professional to always be right and the smartest person in the room.</p>
<p>While professionals are busy doing this, hackers are seeking out ways to find vulnerabilities and exploit them.</p>
<h2>Shifting to a Risk-Based Approach to Cybersecurity</h2>
<p>In talking about cyber risk, there has been a migration from maturity-based to risk-based. To successfully change to this approach, cybersecurity teams need to improve risk comprehension.</p>
<p>The model is dependent upon identifying and focusing on the most probable and high impact risks. Doing this requires a full understanding of the threat landscape and the ability to prioritize them.</p>
<h3>What Is Maturity-Based?</h3>
<p>The traditional maturity-based approach focused on a level of maturity for capabilities in the realm. The goal was to reach maturity in assessing, monitoring, and reacting to potential risks. Additionally, the model used access controls like two-factor authentication. Maturity-based isn’t completely obsolete. It can be a good jumping-off point for building a cybersecurity program.</p>
<p>However, most organizations are past this step. The maturity-based method has unfortunately led to unmanageable scaling. Will you monitor everything? Can you? Spending becomes out of control for this approach, as well.</p>
<p>The most limiting part of such a model is it can paralyze implementation efforts. However, many professionals in the field will promote and follow maturity-based methods over risk-based. Why? You don’t have to understand risk to pull it off.</p>
<h3>What Is Risk-Based?</h3>
<p>The key elements of being risk-based include:</p>
<ul>
<li>Full comprehension of cyber risk</li>
<li>Prioritization of risks based on probability and impact</li>
<li>Measuring security controls to understand your performance against risk</li>
<li>Inclusion of all stakeholders in the cybersecurity space</li>
</ul>
<p>The objective of risk-based is to make risk reduction an outcome. Organizations must focus on the right controls, processes, skillsets, and investment to reach these outcomes. Before you can achieve a risk-based approach, you have to excel at all the elements. Number one is risk comprehension.</p>
<h2>Improving Risk Comprehension for Cybersecurity Professionals</h2>
<p>The first question that comes up is why don’t professionals have this skillset? Didn’t they learn about it during training? It must have been a question on the certification?</p>
<p>Next, we’ll look at why risk comprehension is lacking and how to improve it.</p>
<h3>Better Training</h3>
<p>Educational courses obviously talk about risk, but many just teach the student to score well enough on a multiple-choice test. Thus, they simply have to memorize answers, and they pass.</p>
<p>Hands-on, real-world training is much more than choosing the right letter. They prepare individuals more holistically to succeed in the field. If you want your team of cybersecurity professionals to operate in a risk-based scheme, then you need to ensure they know what it is! Look for candidates with training from organizations recognized for being more than a certification mill.</p>
<p>If your current team lacks this knowledge, then find ways to upskill them so they can grasp the concept. If they posture and affirm they don’t need it, they might not be the best fit. They must admit they don’t know everything and change their mindset. Not all are capable of this.</p>
<h3>Embracing a Growth Mindset</h3>
<p>Fixed mindsets aren’t going to get your organization to a better risk posture. Those with fixed mindsets aren’t open to change or evolution, whereas a growth mindset is. Associated with this mindset are soft skills. They are much harder to learn and adopt as habits than hard skills. Professionals must have the desire to adapt, which will include working on communication and collaboration efforts.</p>
<p>Keep in mind that communication is more than what you say. What matters most is the tone you use and your body language. While some may be eloquent or articulate, that doesn’t mean they have great communication skills. The most important communication adjustments are asking the right questions about risk and really listening to the answers from all stakeholders. You have to think about it from a technical and business side.</p>
<h3>Tempering Change with Acknowledgement</h3>
<p>If you’re a technology leader and want people to improve their skillsets, it’s good to acknowledge what they are doing well. When you do this, people will be more open to the next part of the conversation.</p>
<p>As your team evolves to become risk-based and practices soft skills, keep acknowledging them to keep them motivated.</p>
<h3>Rewiring for Monotasking</h3>
<p>We think that multi-tasking illustrates great productivity and time management. In cybersecurity, multi-tasking can cause errors and distractions. <a href="https://christianespinosa.com/blog/the-value-of-monotasking-what-jesse-itzler-and-rainbow-taught-me/" target="_blank" rel="noopener">Monotasking</a> helps keep the focus on quality. It may take longer to get certain things completed, but it also means that you’re less likely to have to redo something or be open to more significant threats because of mistakes.</p>
<h3>Cultivating Connection with Empathy</h3>
<p>Empathy is probably the greatest attribute anyone could have in any situation. Cybersecurity professionals who possess compassion are better leaders and better at risk comprehension. They can communicate and collaborate better. They also think outside small boxes of “what is risk?”</p>
<p>Helping individuals become more empathetic has lots of consequences beyond being better at risk.</p>
<h2>Building Better Cybersecurity Teams</h2>
<p>Many of the things discussed are part of my Secure Methodology, which is part of my book, <em>The Smartest Person in the Room</em>. I’ve devised a seven-step process to improve cybersecurity professional skills and thus boost risk-based methodologies. It&#8217;s a unique approach that builds on fundamentals.</p>
<p>Learn all about it by <a href="https://www.amazon.com/dp/B08T6QK6FN" target="_blank" rel="noopener">ordering the book today</a>!</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It' data-link='https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It' data-link='https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/">Risk Comprehension Is a Basic Cybersecurity Skill, Yet Most Practitioners Lack It</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/risk-comprehension-is-a-basic-cybersecurity-skill-yet-most-practitioners-lack-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Your Cybersecurity Framework Is Overcomplicated &#8211; Here&#8217;s Why</title>
		<link>https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/</link>
					<comments>https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Thu, 04 Feb 2021 21:50:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[complicated]]></category>
		<category><![CDATA[cybersecurity framework]]></category>
		<category><![CDATA[cybersecurity solutions]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2331</guid>

					<description><![CDATA[<p>Rarely in life is complicated better than simple. However, in advanced disciplines, there’s the misconception that complexity signals thoroughness or expertise. That’s where the world of cybersecurity lives. In most organizations, they thrive on complication. They believe it demonstrates sophistication. Let’s be frank and honest — your cybersecurity framework is overcomplicated. Many use long “checklists” [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/">Your Cybersecurity Framework Is Overcomplicated &#8211; Here&#8217;s Why</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Your Cybersecurity Framework Is Overcomplicated - Here&#039;s Why' data-link='https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2332 " src="https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa.jpg" alt="cybersecurity framework - christian espinosa" width="427" height="283" srcset="https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa.jpg 2124w, https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa-300x199.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa-1024x680.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa-768x510.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa-1536x1020.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2021/02/cybersecurity-frameworks-christian-espinosa-2048x1361.jpg 2048w" sizes="(max-width: 427px) 100vw, 427px" />Rarely in life is complicated better than simple. However, in advanced disciplines, there’s the misconception that complexity signals thoroughness or expertise. That’s where the world of cybersecurity lives. In most organizations, they thrive on complication. They believe it demonstrates sophistication.</p>
<p>Let’s be frank and honest — your cybersecurity framework is overcomplicated. Many use long “checklists” to prove they are experts when, in reality, few of those things matter.</p>
<p>Instead, organizations should focus on the top five <a href="https://www.cisecurity.org/controls/" target="_blank" rel="noopener">CIS (Center for Internet Security) Controls®</a>. In my book, <em><a href="https://christianespinosa.com/book/smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a></em>, I discuss why you need to toss out the lists and master these five controls. Most importantly because they stop <a href="https://www.cisecurity.org/controls/cis-controls-list/" target="_blank" rel="noopener">85 percent of all cyber-attacks</a>. Knowing this, doesn’t it make sense they should be the priority? Until you have these five controls in place, nothing much else matters.</p>
<h2>Why Overcomplication of the Cybersecurity Framework Is Rampant</h2>
<p>If you put credence into the CIS and its expertise, why would so many cybersecurity professionals go off-script? Well, it has a lot to do with the challenges covered in my book about the degradation of the industry. The truth is that cybersecurity professionals are the reason <a href="https://christianespinosa.com/blog/your-cybersecurity-methods-are-failing-heres-why/" target="_blank" rel="noopener">cybersecurity methods are failing</a>. Their actions lead to unnecessary complexity and ignorance of the basic principles.</p>
<p>The people problem and why they cling to their massive lists comes down to a few key areas. It starts with the paper tigers, who are professionals with lots of certifications or degrees that look good on paper. However, these paper tigers don’t have the skillset to perform effectively to protect your data and networks.</p>
<p>These paper tigers or others that have experience but don’t continue to learn and be open often bring in these traits to your team.</p>
<ul>
<li>Insecurity: They never want to be wrong. They live to be right. It’s important for them to look like the superior one on the topic, so they manipulate the cybersecurity framework to prove their worth, often at the detriment of the business.</li>
<li>Fear: These individuals are afraid to look like they don’t have all the answers. They never ask questions or invite discussion. They live in constant fear that others will discover their ineptitude.</li>
<li>Defensiveness: Fearful people are also defensive. Their listening skills devolve into what they can agree or disagree with, meaning they don’t hear much at all. They care too much about being the smartest one; they’ll react negatively to anyone questioning that.</li>
<li>Posturing: People who are insecure, afraid, and defensive use posturing like it’s their job. Their posture is to develop a complex cybersecurity framework, and then they hide behind it.</li>
<li>Poor communication: Technical folks live with the stereotype they are bad communicators. This isn’t always true, but in the scope of this discussion, paper tigers with the above traits do not excel at communication. They love jargon and buzzwords that make them sound smart.</li>
</ul>
<h3>How Did the Industry Get Here?</h3>
<p>As noted earlier, over-certification has been a big driver. <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">Paper tigers</a> also continue to water down a cybersecurity team by hiring those that don’t intimate them. Entire teams or firms could be paper tigers, and they’ll hold dear to their long, complex lists. It’s their safeguard for them. And it’s junk.</p>
<p>What they should care about are the basics:</p>
<ul>
<li>What does the company do?</li>
<li>What do they need to protect?</li>
<li>What’s important to the business?</li>
</ul>
<p>The responses to these questions are the foundation for building a cybersecurity approach. Without this information, you can’t understand the risk or create a personalized strategy. Instead of keeping it simple, paper tigers just refer to their checklist.</p>
<h2>Ditch the Checklist, Focus on the Five</h2>
<p>If any organizational leader is reading this, I urge you to ditch your checklist immediately. It’s not providing value. It’s a front. Instead, it’s time to get back to the basics and truly execute consistently on the five CIS controls.</p>
<h3>Control One: Inventory of Authorized and Unauthorized Devices</h3>
<p>This control represents hardware inventory. You need to manage all hardware devices on your network actively. Management includes:</p>
<ul>
<li>Inventorying</li>
<li>Tracking</li>
<li>Correcting</li>
</ul>
<p>These activities are necessary to ensure that any unauthorized devices do not gain access to the network. This is an essential control because hackers are always scanning and waiting for an unprotected system to enter your network. They are eager to find devices that connect and disconnect from the network, most commonly BYOD (bring your own device).</p>
<p>If BYOD is prevalent on your network, your IT team may not have administration of that hardware. It could be lacking essential updates or patches, which a threat actor will exploit. BYOD is a challenge for large enterprises, but you need to get this under control.</p>
<p>The best approach is to use an active discovery tool to identify and update authorized devices. You also need an accurate inventory of assets, including those not connected to the network.</p>
<h3>Control Two: Inventory of Authorized and Unauthorized Software</h3>
<p>On the other side of the IT is software, and you need to manage it just as you do hardware. Your network needs to prevent any unauthorized software from downloading. Hackers love to get in through software failures. There are plenty of cybersecurity incidents that started with software exploitation. If unauthorized software makes it into your network, hackers can install backdoor programs easily. If you don’t know what software is on your network, how can you protect it?</p>
<p>Management of software requires software inventory tools for automation. Another best practice is whitelisting safe technology. This control point is also vital in planning for incident response, backup, and recovery.</p>
<h3>Control Three: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers</h3>
<p>For all hardware and software, you need to manage the security configurations constantly. It involves a robust change control process. The default settings for most hardware and software are for ease of use, not protecting a network.</p>
<p>You can’t leave them at default! It’s crucial to develop a configuration strategy that reduces risk and allows people to do their job. It’s a balancing act. And that strategy can’t stay stagnant either. It requires frequent evaluation and adjusting. A Security Content Automation Protocol (SCAP) configuration is a good guide for monitoring and verifying.</p>
<h3>Control Four: Continuous Vulnerability Assessment and Remediation</h3>
<p>Cybersecurity is ever-changing, and hackers get smarter all the time. That’s why you must continuously assess vulnerabilities and remediate them quickly. New information is always streaming in, from software patches to security advisories. Your team needs to stay on top of this to identify vulnerabilities proactively.</p>
<p>Without constant scanning and assessments, your organization is in danger every day of an incident. To execute this well, use a SCAP-compliant scanner. You should also deploy automated software updates as soon as they are available.</p>
<h3>Control Five: Controlled Use of Administrative Privileges</h3>
<p>Who has access to your systems? Access is another component that attackers target to cause havoc. You’ll need a tool that allows you to track, control, and assign administrative privileges.</p>
<p>Uncontrolled administrative privileges are a hacker’s dream. They can get in with phishing tactics that get a user to click or download something that’s not safe. If that user has administrative privileges, the hacker can take over fast. They can also get in by cracking easy passwords for admin accounts. Things like this occur when lots of people have admin access with identical passwords.</p>
<p>The best way to protect against this is ensuring admin users have a dedicated account for these activities. It should not be used for anything other than admin functions. Additionally, set up a log entry and alerts for admin account closures or openings.</p>
<p>These controls are not easy to implement and manage. They are continuous activities that a team has to control. Until an organization has these in good order, everything else is meaningless. It doesn’t matter how many items are on the “list” or how professional they sound. They are just words, and when you go by such a list, there is rarely a full and competent execution. Getting back to the basics is what really matters.</p>
<h2>Simplify Your Cybersecurity Framework</h2>
<p>The first step to simplify your cybersecurity framework is making sure your employees grasp the five CIS Controls. Do they have this foundational knowledge? Or are they posturing paper tigers? To master these controls, you need to get your people “in shape.” I go over this in detail and more in my book, <a href="https://www.amazon.com/dp/B08T6QK6FN" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Order it today to get your cybersecurity framework back on track.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Your Cybersecurity Framework Is Overcomplicated - Here&#039;s Why' data-link='https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Your Cybersecurity Framework Is Overcomplicated - Here&#039;s Why' data-link='https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/">Your Cybersecurity Framework Is Overcomplicated &#8211; Here&#8217;s Why</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/your-cybersecurity-framework-is-overcomplicated-heres-why/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
